Next Article in Journal
Innovative Pedicle Screw Insertion with Mixed Reality Technology Improves Insertion Accuracy in Spinal Surgery
Previous Article in Journal
WiPIHT: A WiFi-Based Position-Independent Passive Indoor Human Tracking System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches

1
ESTG—Instituto Politécnico de Viana do Castelo, 4900 Viana do Castelo, Portugal
2
ISEP—Instituto Politécnico do Porto, 4249 Porto, Portugal
3
GECAD—Instituto Superior de Engenharia do Porto R. Dr. António Bernardino de Almeida, 4249 Porto, Portugal
4
ESTG—Instituto Politécnico do Porto, 4610 Felgueiras, Portugal
5
CIICESI, ESTG—Instituto Politécnico do Porto, 4610 Felgueiras, Portugal
6
ADiT-LAB—Rua Escola Industrial e Comercial de Nun’Álvares, Nº34, 4900 Viana do Castelo, Portugal
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(13), 3940; https://doi.org/10.3390/s25133940
Submission received: 10 May 2025 / Revised: 18 June 2025 / Accepted: 21 June 2025 / Published: 24 June 2025

Abstract

This paper explores the security challenges associated with network slicing in 5g networks, a technology that enables the creation of virtual networks tailored to different use cases. This study contributes to network slicing research efforts by providing a comprehensive classification of attacks aligned with the architectural layers of 5g, complemented by practical mitigation approaches suitable for multi-tenant environments. The classification depicts specific attacks and categorizes vulnerabilities across layers such as orchestration, virtualization, and inter-slice communication. Additionally, mitigation strategies are discussed, emphasizing the importance of real-time monitoring and robust access controls. The proposed classification aims to support the development of advanced security mechanisms, including risk assessment models and automated mitigation strategies, tailored to the dynamic and heterogeneous nature of 5g slicing. The findings highlight the need for layered defenses, AI-driven monitoring, and architectural isolation as critical components to enhance the resilience of 5g slicing deployments.
Keywords: 5G networks; network slicing; vulnerabilities; security; risk mitigation 5G networks; network slicing; vulnerabilities; security; risk mitigation

Share and Cite

MDPI and ACS Style

Dias, J.; Pinto, P.; Santos, R.; Malta, S. 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches. Sensors 2025, 25, 3940. https://doi.org/10.3390/s25133940

AMA Style

Dias J, Pinto P, Santos R, Malta S. 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches. Sensors. 2025; 25(13):3940. https://doi.org/10.3390/s25133940

Chicago/Turabian Style

Dias, José, Pedro Pinto, Ricardo Santos, and Silvestre Malta. 2025. "5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches" Sensors 25, no. 13: 3940. https://doi.org/10.3390/s25133940

APA Style

Dias, J., Pinto, P., Santos, R., & Malta, S. (2025). 5G Network Slicing: Security Challenges, Attack Vectors, and Mitigation Approaches. Sensors, 25(13), 3940. https://doi.org/10.3390/s25133940

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop